Essay On Cyber Terrorism In China

Improved Essays
Today as technology continues to advance, the growing concern of cyber terrorism has became an essential factor to the United States infrastructure and US-CERT (United States Computer Readiness Team). Presently, China is the leading force of these attacks against the United States in attempt to steal top secret information and data to improve their economy. In his article “ The code not taken: China, the United States, and the future of cyber espionage,” Adam Segal (2013) writes about the growing problems the United States have come to face with China’s attempts at hacking the United States infrastructure, military blue prints, and top secret government files. For example, China targeted defense contractors and subcontractors at the pentagon …show more content…
Segal continues, in detail of how President Obama and Chinese President Xi have had negotiations in attempt to resolve the issue. President Xi claims that China is also a victim of the attacks, but I find hard to believe if the NIE proved that China “is the most aggressive” in cyber espionage. Notwithstanding, Segal provides readers specific examples how China is very dangerous and a threat when it comes to cyber espionage; through their encoding information from the United States. This article is very reliable and has many facts that lead readers to believe that China is a growing enemy seeking power.
In Conclusion, “ The code not taken: China, the United States, and the future of cyber espionage” by Adam Segal is a very factual article that shows readers China is a growing threat to the United States because of the amount of cyber attacks. Segal explains that even though China has tried to resolve the situation with the United States numerous amount of times, they are still very untrustworthy. The conceivable impact of hacking, cyber terrorism and/or cyber espionage (whatever label you want to use) continues to be of great concern; as the great potential economic consequences are

Related Documents

  • Superior Essays

    Which tells us that cyber warfare is a relatively new warfare. In a recent article from US News; Russia, China, Iran and North Korea all have tactical advantages against the US. These nations have already launched cyber attacks towards civilian areas. The Chinese military stole US plan for the technically sophisticated F-35 Joint Strike Fighter, they created a copycat named J-31. Hackers with strong connections in the Iranian government were earlier this year charged for attacks on US banks.…

    • 913 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    The concept surrounding China’s unpeaceful rise is a fundamental complex debate. In the article, Chinas Unpeaceful Rise, one is exposed to John J. Mearsheimer’s subjective view which states that Chinas rise will be one absence of peace and one accustomed to war. In accordance, the United States, due to the theory of international politics, will ensure that China’s attempt to establish regional hegemony will be challenged by the United States. According to John J. Mearsheimer’s understanding of international politics most prominent goal of state survival and to maximise power over the world and the overall system, Mearsheimer believes that in order for Chins to gain a position of overpowering security, she will attempt to rule the Asia-Pacific…

    • 1375 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    For example, China has proposed an anti-terrorism law which caused alarms. Barack Obama told Reuters on March 2nd, "We have made it very clear to them [China] that this is something they are going to have to change if they are to do business with the United States." The bill gives authority too much power to authorities and potentially worsen human rights violations in China. As well as human right violations, President Obama fears business secrets will be at risk. Article 15 of the bill requires telecommunications carriers and internet service providers to preinstall mechanisms that will allow authorities to inspect their networks anytime and access information about encryption systems without consent.…

    • 967 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Tu 95 Case Study

    • 1741 Words
    • 7 Pages

    military technology and classified information, along with the trade secrets of key U.S corporations. Because of this, the Chinese government has been accused of stealing to support its military and commercial development. The methods they have used are said to be able to avoid prosecution. China partners Chinese companies with American businesses to acquire technology and economic data and through that use cyber spying to bypass computer networks of businesses and agencies. Law enforcement officials have identified China as the most active foreign power involved in illegal possession of U.S technology.…

    • 1741 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Impacts Of Hacktivisms

    • 1524 Words
    • 7 Pages

    With the onslaught of hacking and breaches in privacy by groups ranging from hacker cults to the NSA, individuals and corporations must take steps to protect themselves and their data to prevent any further damage. The impacts of coordinated hacking attacks are widespread and can affect any online services: ranging from PayPal to Sony’s PlayStation Network. A team of hackers, especially one with global support such as Anonymous advocate a policy called “hacktivism”. The concept of hacktivism usually involves using illegal means to target single issues while gaining collective support by a team to proceed with such hacks (Kelly, 2012). The attack conducted on PayPal took place in December of 2010; a Distributed Denial of Service (DDoS) attack…

    • 1524 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    China and North Korea’s government get to watch what their citizens do online. Whether or not it’s an invasion of people’s privacy, it’s unlawful. In China, they made the “Great Firewall of China,” a way of filtering what people get to see and search. The people of China are feeling so threatened by it now that there 's “hacktivist” who are “...involved in a kind of technological arms race, inventing software and using other tactics to allow ordinary Chinese to beat the Great Firewall of China,” from the article CTGFOCWC. In other words, a “hacktivist” is someone who’s “fighting the censors every step of the way,” as described in the article CTGFOCWC.…

    • 938 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Anarchy In China

    • 807 Words
    • 4 Pages

    China’s power hunger has made the south china sea issues into a security dilemma, making states, not only the Philippines, feel threaten by its power resulting in the state building its own military stronger in fear of becoming victims of china’s hunger for the south china sea. even if the states cooperate in some way, they never know the other states intention in the future. the only way to stop china from obtaining full control of the territory is by acting on offensive realism, states becoming a hegemony like china is the only way they can compete against the power hungry. As both scholars state their view, it is clear that their solution for the south china sea conflict has to do with anarchy and the way…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Although some people say that the new agencies implemented after the 9/11 attacks have facilitate communication and integration between security measures and agencies to reshape the community to a better state, many still are not content with the aftermath. Opponents of the wiretapping and the intelligence team think that the system has been flawed all together. Many think that the money spent for the warrantless wiretapping is absurd. Robert Dreyfuss, journalist, contends that: “Even at the height of the Cold War…there was nothing like the post-911 behemoth in existence. A thousand smart intelligence analysts, a thousand smart FBI and law enforcement officers, and a few hundred Special Operations military folk are all that's needed to deal with the terrorism threat” (Intelligence Gathering).…

    • 1328 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The definition of “state secrets” is vague in China, enabling the government to filter or block anything they deem necessary. China’s targeting of foreign Internet services coincides with two national trends. First, China is increasingly worried about domestic terrorism and, second, is the ever-rising nationalism directed towards Japan and its allies, namely the United…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    The ideological orientation that makes China’s revolution so threatening both to America’s status quo and the global structure is formulated into 3 different logics that will be use to define the ‘china threat’ thesis. First of would be the fact that China still sticks to its old roots of the Chairman Mao days of communism has created a bad image of China to the western world. Next would be the geopolitical and geo-economics factors. To further clarify this, a number of realists and even China has dismissed this ideological straitjacket. As China now is a great power in the world of a humongous size and would only continue its own interest and respect.…

    • 1577 Words
    • 7 Pages
    Great Essays