HomeContact Site map   Google    www    iipm think tank
   
   
Home Scrutiny Publications Under Cover Mus'ings  
 

Home > Scrutiny > The new threat from China

  
   
     
   Case Studies  
       
  Marketing    
  Human Resource    
  Information Technology    
  Finance    
  Strategy    
       
 
     
   Industries  
       
  Steel    
  Glass    
  Banking    
  Prophylactic    
  Auto    
  Hospitality    
  Energy    
       
 
     
   Other links  
       
  IIPM    
  Planman Consulting    
  Planman Marcom    
  Planman Technologies    
  Daily Indian Media    
  Planman Financial    
  4P's Business and Marketing    
  Business and Economy    
  The Daily Indian    
  The Sunday Indian    
  Arindam Chaudhuri    
  GIDF    
       
 
  
         
Scrutiny
  
The new threat from China
When hacking is used for military & political reasons…
18/10/2007

The emerging superpower and the growing threat to superpowers has now emerged as the leader in cyber warfare too. China is the only country which has been indicted of using hacking for political and military purpose. Be it for battlefield preparations or developing hacking networks, China’s leap into this century’s cyber warfare technology has created a serious and horrifying problem for the world.

Among almost 120 countries working on cyber warfare, China tops the chart. Chinese hackers even hit a secure pentagon system named NIPRNet, which is used to call US forces in emergency. This eventually helped China to force Taiwan to surrender by keeping US forces at bay. However, Chinese attacks are not only confined to the Pentagon but also to German federal ministries and British government offices, which are much worried about Chinese hacking. As per the German officials, 60% of the cyber attacks in their system come from China alone. Interestingly, China claims that perpetrators should essentially carry on with this holy work. Ever wondered what would happen if China starts controlling all the networks of the world?

By:- B&E
Back

  
 
 
       
Home | Scrutiny | Publications | About us | Contact us
Copyright @2010 iipm think tank. All rights reserved.