seems that soon, many electronic and print media will have a new column in which the terms information security or the war will be the key.Another ten or fifteen years ago, it was difficult to associate the state with espionage internet due to the low integration of computers in the industry in many countries, but now it's popping up documents such as this one - «Cybersecurity and Cyberwarfare.Preliminary Assessment of National Doctrine and Organization »(Cybersecurity and cyber war, preliminary estimates of the National Doctrine and Organization).
is noteworthy that this is not the document contains background information about one of the UN agencies - UNIDIR (United Nations Institute for Disarmament Research), and the fact that the above terms have become "workers".For example, another "State Commission for the monitoring of economic and security issues between the US and China" has developed and introduced (in the last year!) Report, qualifying opportunities and prospects of China in cyberspace.And when you consider that this commission has a mandate from the US Congress and makes recommendations for the defense department of the United States, the level of seriousness of intent can not be questioned and information security has priority economic.
from China arrives even less information, but this does not mean that information security is foreign to China.On the other hand, not so long ago the Chinese made many global brands move production to itself (enough to ask where are going to the latest iPad, not to mention the accessories).This means that the West itself has brought to China the latest technology that can be used for various purposes.This was also mentioned in the report, particularly in respect of the technical configuration of the armed forces of the United States.Do not forget about the academic and financial resources to China, which operate worldwide and are represented in all sectors of the global economy on all inhabited continents.
It's no secret that many software and technology giants China develop technologies and devices t. N."Dual-use" carrying out government orders.As in the US, China's economic and information security is supervised by a number of special services, but the main thing behind it all - the opposition moved to a new environment, where there are no conventional boundaries and rules of the game have not yet been identified.This factor is crucial at the moment, so there is an unwritten rule acts "who had, and he ate."In practice, however, and the one and the other side of this situation is to arrange everything to the first issue, which will be impossible to conceal;Only after that we can expect that the parties will be able to admit to such a war, and sit down at the negotiating table.
results of this covert race can be seen, for example, that most IT companies in the United States is already unofficially stopped hiring ethnic Chinese and immigrants from Southeast Asia to work;even outsourcing gradually began to move away from the traditional Asian markets and to look towards the countries of the former Soviet Union, Latin America (Brazil in particular) and Eastern Europe.No one is currently not want to recognize the existence of such discrimination, but such a division along ethnic lines in the current environment takes a new form.