Authoritarian Influence Operations in East Asia: Chinese Foreign Interference Through Cyberwarfare, Influence Operations, and Coercion

Total Page:16

File Type:pdf, Size:1020Kb

Authoritarian Influence Operations in East Asia: Chinese Foreign Interference Through Cyberwarfare, Influence Operations, and Coercion AUTHORITARIAN INFLUENCE OPERATIONS IN EAST ASIA: CHINESE FOREIGN INTERFERENCE THROUGH CYBERWARFARE, INFLUENCE OPERATIONS, AND COERCION Adam Foster Recently, China has increased its foreign political interference operations and developed cyber-strategies to hedge against threats from both state and individual actors. Since 2016, IR scholars have recognized Russian attempts at foreign interference in advanced democracies and US allies. Investigation as to how the Chinese government has devel- oped and deployed foreign interference tactics, however, have largely gone unnoticed. Through the examination of case-studies in Chinese cyberwarfare, influence operations in Australia, and economic and diplomatic coercion in Taiwan, this paper aims to determine how the CCP uses foreign interference tactics to address its regime security concerns. This paper will argue that, as a safeguard against threats to its regime security, China has increasingly deployed interference in domestic economies and politics as part of its statecraft. Cyberwarfare efforts to promote pro-PRC business leaders and elected officials in Australia and to influence Taiwan’s media have had some success in promoting pro- PRC views. However, overt electoral interference by the CCP almost inevitably leads to negative media coverage and backlash against the PRC. INTRODUCTION As China asserts itself as a global superpower, the Chinese Communist Party endeav- ors to pursue legitimation of its rule via reinstating the historical norm of Chinese political, economic, and cultural dominance in East Asia. Whereas prior to the Xi Jinping era, the CCP was content to live within an international system centered around US hegemony, its surge in both economic and political capital has encouraged the CCP to increase foreign political interference operations and develop cyber-op- erations strategies to hedge against risk from both state and individual actors that the CCP perceives as a threat to regime security. These policies are designed with the intent to change behavior and subvert organized opposition to Chinese interests, re- gardless of the target’s diplomatic or economic relationship with the US. To that end, how exactly does the CCP use foreign interference tactics to address regime security concerns? While the list of entities that China considers to be a threat to its national interests continues to grow, there are only a select number of actors that methodically criticize Chinese behavior or pose a threat to ongoing core CCP policies or national security. These policies include the One China Two Systems policy, the One China Policy, and, under Xi Jinping, the One Belt One Road Initiative. The DPP in Taiwan, Adam Foster is a rising senior at Tufts University pursuing a double major in International Relations and Chinese with a concentration in Security. He currently works as the Lobbying Coordinator for One Day Seyoum, and his publications have appeared in the Tufts Daily and the 2001 Magazine. Due to his past advocacy and research efforts, he was recently awarded the 2021 Anne E. Borghesani Memorial Prize. His other interests include a passion for reading, skiing, and ballroom dancing. He plans to study in Beijing for the fall of 2021. Authoritarian Influence Operations in East Asia and more recently both major political parties in Australia, pose an active threat to current or future CCP policy initiatives. Action taken by the CCP against these actors provide repeated, visible examples of Chinese foreign political interference. The ten- dency of CCP party officials to divide the world into friends and enemies is a reflec- tion of the harsh retaliation that awaits those who publicly question how it chooses to exercise power (Schrader 2020, 1). The efficacy of such political interference is mea- sured in two outcomes: whether or not the CCP has successfully removed threatening parties or actors from power. To safeguard against threats to its regime security, China has increasingly deployed interference in foreign domestic economies and politics as part of its state- craft. Cyber-warfare efforts to cultivate and promote pro-PRC business people and elected officials in Australia and influence Taiwan’s media, have had some success in promoting pro-PRC views. However, overt electoral interference (to change election outcomes or fund/support pro-PRC politicians) almost inevitably leads to negative media coverage and backlash against PRC. LITERATURE REVIEW Investigation as to how the Chinese government has developed and deployed for- eign interference tactics are hampered by lack of covert operations evidence, modest amounts of scholarship for China as opposed to the former Soviet bloc, as well as the uniqueness of Chinese operations. By late 2016, most of the Western world became aware of the devastation of foreign influence campaigns, effectively demonstrated by Russian attempts at tampering in the US presidential election. These cost-effective methods involved relatively few hackers, classified information leaks, and bot farms based on social media platforms (Mohan and Wall 2019, 110–119). These meth- ods successfully eroded trust in the voting and justice systems of one of the world’s foremost democracies, demonstrating both the inherent advantage of authoritarian regimes in political interference and the weakness of advanced democracies (Lahmann 2020, 189–224). Though the US and other Western powers had been previously aware of the power of psychological operations as a military tool, this was the first instance that foreign interference operations had used the medium of technology and succeeded in influencing a large civilian population. As such, 2016 prompted the re-evaluation of cyberwarfare and influence operations as authoritarian tools for dem- ocratic political interference. For most scholars, this was limited to an in-depth study into how the Rus- sians interfered with the US elections (Mohan and Wall 2019, 110–119; Ambrosio 2007, 49–57; Bader 2012, 49–57), the validity of electoral interference in interna- tional law (Lahmann 2020, 189–224; United Nations 2015), the benefits of electoral interference (Borzyskowski 2019), or how the Soviet Union and WWII-Great Powers used electoral interference to their benefit (Levin 2019; Bubeck and Marinov 2019). An even smaller subset of these scholars actively investigated the history of political interference of other authoritarian regimes outside of Europe (Allison 2008, 185– Adam Foster 202), and an even smaller subset attempted to identify modern attempts at foreign interference in other authoritarian regimes such as China (Diamond and Schell 2018, 145–154). Scholars were initially deterred by the intrinsic difficulty of investigation of covert operations which were compounded by the plausible deniability, stealth, and anonymity inherent to the Internet. In addition, the absence of evidence that China in the mid-2010s had the capabilities or political will to achieve these political influence operations, limited the dataset of Chinese foreign interference to papers published lat- er than 2018, when China was first discovered assisting the KMT in local elections in Taiwan (Templeman 2020, 85–99). The motivations for China to pursue such politi- cal interference are obvious in hindsight: in recent years China has expressed a strong interest in not only severing US ties to the East Asian region as well as undermining the legitimacy of national governments or anti-CCP parties (Schrader 2020, 1–6, 10– 14). Moreover, the CCP under Xi Jinping has shown a strong preference for low-in- tensity confrontation below the level of armed conflict. Plus, the unique inherent advantage of authoritarian regimes in having no legitimate elections, the weakness and susceptibility of democratic to foreign influence campaigns, and the innovations in technological influence successfully deployed against the US by other authoritarian re- gimes, indicates a strong Chinese incentive to establish their own foreign interference programs (Diamond and Schell 2018, 145–154). Since then, international relations experts and domestic governments alike have attempted to decipher the multi-faceted structure of the Chinese intelligence system to uncover Chinese political interference in their own countries (Faligot and Lehrer 2019). Some, like Australia and Taiwan, have emerged with concrete evidence of Chinese attempts at cyberwarfare, influence operations, and diplomatic and economic coercion efforts. These explosive develop- ments were covered in depth by many contemporary news articles but have yet to be digested by the small field of East Asian International Relations Scholars. As such, while most experts studying China agree that the Xi Jinping’s CCP has increasingly come into conflict with Western-aligned countries in the late 2010s and early 2020s, they disagree as to the scope of political interference, the goals that China is pursuing via its political interference, and by extension how China will focus its efforts in conjunction with Western-aligned powers in the future. Based on analysis of Chinese strengths and weaknesses, experts attempt to determine how the CCP uses their perceived strengths to extrapolate how China will favor certain political interfer- ence methods. These arguments on the strengths and uniqueness of Chinese foreign inter- ference are diverse and include topics on: cyberwarfare, influence operations, and eco- nomic and diplomatic coercion—including subsets of these topics such as the devel- opment of aggressive Chinese diplomatic
Recommended publications
  • Analysis of Cyberwarfare Ethics As It Pertains to Civilian Computer Networks/Infrastructures
    Analysis of Cyberwarfare Ethics as It Pertains to Civilian Computer Networks/Infrastructures Vanessa Paradine Terms of Reference and Scope The Department of Defense (DoD) currently operates more than fifteen thousand different computer networks across four thousand military installations around the world, with as many as seven million DoD computers and telecommunications tools in use in eighty-eight countries.1 These networks experience over six million unauthorized probes per day.2 Due to the close integration of DoD and commercial networks, an attack within the cyber domain may significantly impact critical civilian infrastructures and networks. For the purpose of this article, the following definitions are pro­ vided: • Cyberspace, as defined by the National Security Presidential Di­ rective 541H0meland Security Presidential Directive 23, is "the interdependent network of information technology infrastruc­ tures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries."3 • Cyberspace operations is defined as "the employment of cy­ berspace capabilities where the primary purpose is to achieve military objectives or effects in or through cyberspace."4 • Cyberwarfare/cyberattack has not been defined by the Depart­ ment of the Defense (DoD); however, according to Deputy Defense Secretary William J. Lynn III, it can include a range of things-"from exploitation and exfiltration of data to degrada­ tion of networks to destruction of networks or even physical equipment, physical property."5 • Cyber Threats6 o Virtual-nonkinetic threats to DoD information networks that are just as real and damaging as physical threats. 34 Internatianal Journal of Intelligence Ethics, Vol. 4, No. 1 / Spring/Summer 2013 Analysis of Cyberwarfare Ethics 35 o Physical-kinetic threats mixed with nonkinetic threats; can severely impact the effectiveness of military joint operations.
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • A History of Misconduct: the Case for a Federal Icac
    MISCONDUCT IN POLITICS A HISTORY OF MISCONDUCT: THE CASE FOR A FEDERAL ICAC INDEPENDENT JO URNALISTS MICH AEL WES T A ND CALLUM F OOTE, COMMISSIONED B Y G ETUP 1 MISCONDUCT IN POLITICS MISCONDUCT IN RESOURCES, WATER AND LAND MANAGEMENT Page 5 MISCONDUCT RELATED TO UNDISCLOSED CONFLICTS OF INTEREST Page 8 POTENTIAL MISCONDUCT IN LOBBYING MISCONDUCT ACTIVITIES RELATED TO Page 11 INAPPROPRIATE USE OF TRANSPORT Page 13 POLITICAL DONATION SCANDALS Page 14 FOREIGN INFLUENCE ON THE POLITICAL PROCESS Page 16 ALLEGEDLY FRAUDULENT PRACTICES Page 17 CURRENT CORRUPTION WATCHDOG PROPOSALS Page 20 2 MISCONDUCT IN POLITICS FOREWORD: Trust in government has never been so low. This crisis in public confidence is driven by the widespread perception that politics is corrupt and politicians and public servants have failed to be held accountable. This report identifies the political scandals of the and other misuse of public money involving last six years and the failure of our elected leaders government grants. At the direction of a minister, to properly investigate this misconduct. public money was targeted at voters in marginal electorates just before a Federal Election, In 1984, customs officers discovered a teddy bear potentially affecting the course of government in in the luggage of Federal Government minister Australia. Mick Young and his wife. It had not been declared on the Minister’s customs declaration. Young This cheating on an industrial scale reflects a stepped aside as a minister while an investigation political culture which is evolving dangerously. into the “Paddington Bear Affair” took place. The weapons of the state are deployed against journalists reporting on politics, and whistleblowers That was during the prime ministership of Bob in the public service - while at the same time we Hawke.
    [Show full text]
  • Understanding and Combating Russian and Chinese Influence Operations by Carolyn Kenney, Max Bergmann, and James Lamond February 28, 2019
    Understanding and Combating Russian and Chinese Influence Operations By Carolyn Kenney, Max Bergmann, and James Lamond February 28, 2019 Russia’s interference in the 2016 U.S. presidential elections has focused American attention on the long-standing and complicated subject of malign foreign influence operations. While Russia has brought this issue into the mainstream political conversa- tion, concerns over the ability of foreign nations—particularly autocracies—to exploit the openness of America’s democracy in order to influence U.S. policy and politics are not confined to any single foreign actor. In fact, influence efforts by Iran and Persian Gulf monarchies have also drawn considerable scrutiny, as have those carried out by China.1 Yet when considering offenders’ capabilities and positions as geopolitical com- petitors, China and Russia stand out as the two most immediate concerns. While foreign influence operations are not new, the convergence of three larger global trends has made them a more important and acute challenge. The first trend is the re-emergence of geopolitical great power competition, which is why the United States’ renewed attention on foreign influence should focus primarily on the country’s great- est geopolitical adversaries—Russia and China.2 However, Russia and China are also bolstered geopolitically by the second trend: the rise of nationalism and authoritarian- ism around the world, particularly in democracies, which is a driving force behind the unfortunate return of great power competition. Authoritarian regimes have seized on a series of setbacks within liberal democracies to bolster the image of alternative autocratic models of political and economic governance on a global scale.3 In addition, auto- cratic regimes have exploited the openness of liberal democratic societies to influence and undermine democracy.
    [Show full text]
  • Cognitive Warfare.Pdf
    1 Table of Contents Executive Summary 3 Introduction 5 Evolution of Non-Kinetic Warfare 6 Origins 6 Psychological Warfare (PsyOps) 7 Electronic Warfare (EW) 7 Cyberwarfare 8 Information Warfare 8 Cognitive Warfare 9 Goals of Cognitive Warfare 11 Destabilization 12 Case 1: Destabilization through Confusion 13 Case 2: Destabilization by Sowing Division 15 Case 3: Destabilization as a Means to Influence 17 Influence 20 Case 1: Influencing to Recruit 21 Case 2: Influencing Policy Enactment 22 Case 3: Influencing as a Means to Destabilize 23 Future Threats 27 Looking Ahead 27 Threat 1: Ease of Selection and Virality 29 Threat 2: A New Age of Truth 30 Threat 3: Cyber-induced Institutional Discomfort and Distrust 31 Threat 4: Biological and Therapeutic Emotional Manipulation 32 Threat 5: Enhanced Recruitment of Agents 33 Strategy Recommendations 35 Threat Recognition Framework and Criteria 35 Risk Assessment 36 Organizational Implementations 37 Offensive Considerations 39 Closing Thoughts 40 Bibliography 41 2 Executive Summary Warfare has shifted dramatically over the past several decades, moving away from the physical threats of conventional warfare. War now moves towards the social and ideological threats brought about by mass media and advances in technology. The advent of this new type of warfare is different from anything we have seen before. Although it takes elements from previous types of hybrid warfare, the reach and level of impact it possesses make it far more dangerous than its predecessors. We have dubbed this new way of war cognitive warfare. ​ ​ Cognitive warfare, although sharing various similarities to other non-conventional and non-kinetic types of warfare/operations, is ultimately unique in its execution and purpose.
    [Show full text]
  • Kinetic Tactics of Competing Powers Over the Coming Decade
    A Virtual Think Tank (ViTTa®) Report September 2019 Kinetic and Non- Kinetic Tactics of Competing Powers Over the Coming Decade Deeper Analyses Clarifying Insights Better Decisions NSIteam.com Produced in support of the Strategic Multilayer Assessment (SMA) Office (Joint Staff, J39) Kinetic and Non-Kinetic Tactics of Competing Powers Over the Coming Decade Author George Popp Editors Sarah Canna and George Popp Please direct inquiries to George Popp at [email protected] What is ViTTa? NSI’s Virtual Think Tank (ViTTa) provides rapid response to critical information needs by pulsing a global network of subject matter experts (SMEs) to generate a wide range of expert insight. For the Strategic Multilayer Assessment (SMA) Future of Global Competition and Conflict project, ViTTa was used to address 12 key questions provided by the project’s Joint Staff sponsors. The ViTTa team received written response submissions from 65 subject matter experts from academia, government, military, and industry. This report consists of: 1. A summary overview of the expert contributor response to the ViTTa question of focus. 2. The full corpus of expert contributor responses received for the ViTTa question of focus. 3. Biographies of expert contributors. _________________________________ Cover image: https://ak9.picdn.net/shutterstock/videos/12961529/thumb/1.jpg RESEARCH ▪ INNOVATIONNSI ▪ EXCELLENCE II Kinetic and Non-Kinetic Tactics of Competing Powers Over the Coming Decade Table of Contents What is ViTTa? ...................................................................................................................................................................................
    [Show full text]
  • Testimony Before the U.S.-China Economic and Security Review Commission
    Testimony before the U.S.-China Economic and Security Review Commission China’s Belt and Road Initiative: Five Years Later Regional Reactions and Competing Visions 25 January 2018 Tobias Harris Vice President, Teneo Intelligence Economy, Trade, and Business Fellow, Sasakawa Peace Foundation USA Introduction Thank you for giving me the opportunity to testify before the U.S.-China Economic Security Review Commission today on the subject of regional reactions to China’s Belt and Road Initiative (BRI). China’s USD 1tn program of infrastructure investment presents opportunities for its sixty-five member countries to develop, while also raising risks of over-dependence on Chinese investment, unsustainable borrowing, and high environmental and social costs for host nations.1 The risks and opportunities of the BRI extend even to Asia’s developed democracies, which already have complex economic relationships with China and interests in promoting development across Asia. In my remarks today I will focus on how Japan – which is in the process of developing a strategy of limited engagement with the BRI – has responded to the BRI, touching briefly on Australia to show some of the difficulties presented by the BRI. The Japanese case is particularly instructive because it shows that on the one hand, building a positive relationship with China may increasingly require engagement with the BRI in some form, while, on the other hand, showing that it is possible and even necessary for Asia’s wealthier democracies to pursue their own development strategies to help BRI members minimize their dependence on China and maximize their freedom of action. Japan may not be able to match China’s promises dollar for dollar, but through its willingness to increase its lending, loosen rules and implement other reforms to its foreign assistance institutions, and to promote private investment by Japanese companies Tokyo has arguably outlined a possible response to the BRI even as it considers participating in the BRI.
    [Show full text]
  • Still Anti-Asian? Anti-Chinese? One Nation Policies on Asian Immigration and Multiculturalism
    Still Anti-Asian? Anti-Chinese? One Nation policies on Asian immigration and multiculturalism 仍然反亚裔?反华裔? 一国党针对亚裔移民和多元文化 的政策 Is Pauline Hanson’s One Nation party anti-Asian? Just how much has One Nation changed since Pauline Hanson first sat in the Australian Parliament two decades ago? This report reviews One Nation’s statements of the 1990s and the current policies of the party. It concludes that One Nation’s broad policies on immigration and multiculturalism remain essentially unchanged. Anti-Asian sentiments remain at One Nation’s core. Continuity in One Nation policy is reinforced by the party’s connections with anti-Asian immigration campaigners from the extreme right of Australian politics. Anti-Chinese thinking is a persistent sub-text in One Nation’s thinking and policy positions. The possibility that One Nation will in the future turn its attacks on Australia's Chinese communities cannot be dismissed. 宝林·韩森的一国党是否反亚裔?自从宝林·韩森二十年前首次当选澳大利亚 议会议员以来,一国党改变了多少? 本报告回顾了一国党在二十世纪九十年代的声明以及该党的现行政策。报告 得出的结论显示,一国党关于移民和多元文化的广泛政策基本保持不变。反 亚裔情绪仍然居于一国党的核心。通过与来自澳大利亚极右翼政坛的反亚裔 移民竞选人的联系,一国党的政策连续性得以加强。反华裔思想是一国党思 想和政策立场的一个持久不变的潜台词。无法排除一国党未来攻击澳大利亚 华人社区的可能性。 Report Philip Dorling May 2017 ABOUT THE AUSTRALIA INSTITUTE The Australia Institute is an independent public policy think tank based in Canberra. It is funded by donations from philanthropic trusts and individuals and commissioned research. Since its launch in 1994, the Institute has carried out highly influential research on a broad range of economic, social and environmental issues. OUR PHILOSOPHY As we begin the 21st century, new dilemmas confront our society and our planet. Unprecedented levels of consumption co-exist with extreme poverty. Through new technology we are more connected than we have ever been, yet civic engagement is declining.
    [Show full text]
  • October 2019 Newsletter
    October 2019 newsletter Electoral Regulation Research Network Contents 3 Director’s Message 4 Electoral News 7 Forthcoming Events 8 Event Reports 9 Publications 13 Case Notes Spence v State of Queensland Palmer v Australian Electoral Commission [2019] HCA 24 Setka v Carroll [VSC 571 Yates v Frydenberg De Santis v Staley and Victorian Electoral Commission Director’s Message There is a diversity of electoral systems the workshop, I was struck firstly how, countries where the level of knowledge is worldwide. Each electoral system has despite all these differences, there is low. A critical example here is Australia’s its distinctive peculiarities – Australia a common moral vocabulary when it largest neighbour, Indonesia, with ERRN is no different. It is among a dozen came to understanding and evaluating having held a number of events on or so countries that have an effective elections, much of which loosely comes Indonesian elections. compulsory voting system; its preferential under the rubric of free and fair elections. system is very much unique. The challenges commonly experienced by Second, embrace the unfamiliar. The these two countries were also apparent usual comparator countries are Canada, Such diversity is not necessarily a with three specifically noteworthy: United Kingdom and the United States. problem from the perspective of political participation and representation This focus on the Anglo-Saxon sphere democratic government. As High Court by marginalised communities; ‘fake news’ (which curiously often omits New Justice Dawson recognized in McGinty v and digital campaigning; and money in Zealand) is manifestly narrow. And it is Western Australia, ‘(t)here are hundreds politics.
    [Show full text]
  • Civilians in Cyberwarfare: Conscripts
    Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION .............................................................
    [Show full text]
  • Tribe-Of-Hackers-Cybersecurity-Advice-From-The
    TRIBE OF HACKERS TRIBE OF HACKERS Cybersecurity Advice from the Best Hackers in the World Marcus J. Carey & Jennifer Jin Cover illustration: Creation © Allriot.com Cover and book design: www.adamhaystudio.com Copyright © 2019 by Marcus J. Carey. All rights reserved. Published by Threatcare Press in Austin, Texas. No part of this publication may be copied, reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic or mechanical (including photocopying, electronic, recording, or otherwise) without the prior permission in writing from the publisher. Limit of Liability/Disclaimer of Warranty: The views and opinions expressed in this book are of the contributors themselves and do not necessarily reflect the views of the co-authors, Threatcare, or its employees. While the authors have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. This work is sold with the understanding that neither the authors nor the publisher are held responsible for the results accrued from the advice in this book. Neither the publisher nor the authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. ISBN: 978-1-79346-418-7 Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 First Edition www.tribeofhackers.com Introduction 1 01 Marcus J.
    [Show full text]
  • The Ethics of Cyberwarfare Randall R
    This article was downloaded by: [University of Pennsylvania] On: 28 February 2013, At: 08:22 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Journal of Military Ethics Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/smil20 The Ethics of Cyberwarfare Randall R. Dipert a a SUNY (State University of New York) at Buffalo, NY, USA Version of record first published: 16 Dec 2010. To cite this article: Randall R. Dipert (2010): The Ethics of Cyberwarfare, Journal of Military Ethics, 9:4, 384-410 To link to this article: http://dx.doi.org/10.1080/15027570.2010.536404 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.tandfonline.com/page/terms-and- conditions This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae, and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand, or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material. Journal of Military Ethics, Vol. 9, No. 4, 384Á410, 2010 The Ethics of Cyberwarfare RANDALL R.
    [Show full text]