China's Increasingly Muscular Cyberwarfare Capability
Cybersecurity Advisors Network
Release Date: 03/05/2024
Cybersecurity Advisors Network
We are honoured to welcome Nigel Phair, founding force behind Australia’s first High-Tech Crime Centre, Director for CREST Asia Pacific and Cybersecurity Professor at Monash university, to the Secure-in-Mind podcast. In this episode, we trace his shift from AFP investigations to shaping global infosec certification, we touch on Australia’s evolving cyber-professionalisation debate, and explore how AI and low-/no-code tools are rewriting secure development. We cross a lot of territory, so whether you're on a board or on a development team, there'll be something for you. Blog post with...
info_outlineCybersecurity Advisors Network
Nick Kelly is pleased to welcome Philip Amann, the current Head of Digital Security at the and veteran strategist from , The , the , and beyond, for our latest podcast episode. We cut straight to how real-world security gets built: nailing secure coding and patching before chasing zero-days, turning and mandates into everyday habits, and even gamifying developer training to tackle legacy tech. Whether you’re drafting policy or shipping production code, this conversation offers practical takeaways on making cybersecurity everyone’s business. Tune in for some incredible...
info_outlineCybersecurity Advisors Network
Vilija Vainaite is co-founder of Women 4 Cyber Netherlands, and of Encode Europe. Notes and links: Due to the volume of supporting links and text, we've listed them on the CyAN blog, available here: Vilija Vainaite on LinkedIn: John Salomon on LinkedIn: Check out the rest of CyAN's media channels on https://cybersecurityadvisors.network/media - and visit us at Original video at Intro/outro music courtesy of Studio Kolomna via Pixabay:
info_outlineCybersecurity Advisors Network
Bjørn Ihler is Director of the Sweden-based Khalifa Ihler Institute, as well as founder and CEO of Revontulet, a Norwegian consultancy devoted to helping organisations protect themselves against terrorism and violent extremism. Part III of our mini-series on terrorism and violent extremism deals with freedom of speech, laws, personal and corporate obligations, and support for survivors of extremist violence. Notes and links: Due to the volume of supporting links and text, we've listed them on the CyAN blog, available here: Bjørn Ihler on LinkedIn: John Salomon on LinkedIn: ...
info_outlineCybersecurity Advisors Network
Bjørn Ihler is Director of the Sweden-based Khalifa Ihler Institute, as well as founder and CEO of Revontulet, a Norwegian consultancy devoted to helping organisations protect themselves against terrorism and violent extremism. We continue our conversation about terrorism - including whether the term has been watered down due to overuse, how we can spot extremist content, what some of the tactics of actors are, and how extremist and violent groups relate to more legitimate-yet-extreme political parties. Notes and links: Due to the volume of supporting links and text, we've listed them...
info_outlineCybersecurity Advisors Network
Bjørn Ihler is Director of the Sweden-based Khalifa Ihler Institute, as well as founder and CEO of Revontulet, a Norwegian consultancy devoted to helping organisations protect themselves against terrorism and violent extremism. An activist, expert, and frequent speaker on the topic of terrorist and violent extremist content (TVEC), Bjørn joins us today to share his thoughts on the very broad topic of "terrorism". What is it, who are the major actors, who is affected and how, where does terrorism come from, and more - these are all topics that we touch on in this fascinating...
info_outlineCybersecurity Advisors Network
Retour sur le webinaire organisé par l’initiative Black Is Ethical – 26 mars 2025 Le 26 mars 2025, l’initiative Black Is Ethical, soutenue par le Cybersecurity Advisors Network (CyAN) a organisé un webinaire autour d’un thème essentiel pour l’avenir de la cybersécurité :Comment instaurer une relation de confiance entre le Data Protection Officer (DPO) et le Hacker Éthique ? Ce webinaire a permis de croiser les regards de professionnels issus des domaines de la protection des données, de la sécurité offensive et de la gouvernance numérique. Version video: ...
info_outlineCybersecurity Advisors Network
This week, CyAN welcomes Gate15 Managing Director Andy Jabbour for a meandering talk around intelligence sharing, information security investments and ROI, US and European cyber policy, defence, and more. Notes and links: Due to the volume of supporting links and text, we've listed them on the CyAN blog, available here: https://cybersecurityadvisors.network/2025/03/21/new-podcast-information-sharing-cybersecurity-politics-threats-and-more/ Andy Jabbour on LinkedIn: https://www.linkedin.com/in/andy-jabbour/ ...and on BlueSky: @andyjabbour.bsky.social John Salomon on LinkedIn:...
info_outlineCybersecurity Advisors Network
Image-Based Sexual Abuse (IBSA) is a Growing Threat Online! IBSA can happen to anyone—regardless of age, sex, or gender. With the rise of AI and deepfakes, both real and fake intimate images are being shared without consent, causing immense harm. Explore the recorded session of "Breaking the Cycle – Combating Online Image-Based Sexual Abuse." Delve into expert discussions on the severe impacts of IBSA (Image-Based Sexual Abuse), strategies for prevention, and the pivotal role of technology in creating safer digital spaces. This webinar discusses the complexity and...
info_outlineCybersecurity Advisors Network
Due to the volume of supporting links and text, we've listed them on the CyAN blog, available here: Hugo Tarrida on LinkedIn: John Salomon on LinkedIn: Check out the rest of CyAN's media channels on https://cybersecurityadvisors.network/media - and visit us at Original video at https://youtu.be/twC6NTt9R8E Intro music courtesy of AlexiAction via Pixabay: https://pixabay.com/users/alexiaction-26977400/ Outro music courtesy of Studio Kolomna via Pixabay: Episode artwork via
info_outlineIn today's episode of State of (Cyber)War, Hugo Tarrida and John Salomon talk about China's approach to cyberwar. What is the history behind Chinese cyber capabilities? What are Chinese geopolitical, economic, and social objectives that drive their international cyber activities? What are some of the biases that we should be aware of when evaluating the trajectory of China and its cyberwar abilities?
Also don't forget to check out our previous video about Chinese disinformation activities here: https://youtu.be/xBAJ2rBKrMc
Notes and links:
Hugo Tarrida on LinkedIn: https://www.linkedin.com/in/hugo-tarrida-32915a204/
John Salomon on LinkedIn: https://www.linkedin.com/in/johnsalomon/
Wikipedia article worth reading about Chinese cyber warfare: https://en.wikipedia.org/wiki/Cyberwarfare_by_China
05:42 Granted, Stuxnet was a joint US-Israeli venture - https://en.wikipedia.org/wiki/Stuxnet
07:06 https://www.reuters.com/world/russia-says-its-working-major-new-agreement-with-iran-2023-12-12/
14:05 Titan Rain - https://en.wikipedia.org/wiki/Titan_Rain
Related: Operation Aurora (2009) - https://en.wikipedia.org/wiki/Operation_Aurora
15:20 https://www.npr.org/2022/05/11/1098368201/a-spying-scandal-and-the-fate-of-western-sahara
17:07 The case of Wen Ho Lee, one of several perpetrators of military espionage: https://sgp.fas.org/crs/nuke/RL30143.pdf
20:30 https://nattothoughts.substack.com - Nellie Ohr and her team do excellent analysis work
20:50 "An Analysis of China's Great Cannon" - https://www.usenix.org/system/files/conference/foci15/foci15-paper-marczak.pdf
Shoutout to fellow UC Berkeley CSUA member Nick Weaver for co-authoring this paper)
27:48 E.g. "The 'Century of Humiliation' and China's National Narratives" - https://www.uscc.gov/sites/default/files/3.10.11Kaufman.pdf
29:42 Belt and Road Initiative - https://www.cfr.org/backgrounder/chinas-massive-belt-and-road-initiative
32:38 Referenced here: https://en.wikipedia.org/wiki/Chinese_information_operations_and_information_warfare ("Definitions" section)
32:45 The Three Warfares: https://apps.dtic.mil/sti/tr/pdf/ADB372300.pdf
34:04 The Nine-Dash Line: https://chinaus-icas.org/research/map-spotlight-nine-dash-line/
34:52 In fact, ruled to be explicitly illegal by the Permanent Court of Arbitration in 2016:
https://pca-cpa.org/en/news/pca-press-release-the-south-china-sea-arbitration-the-republic-of-the-philippines-v-the-peoples-republic-of-china/
36:19 US FBI director Christopher Wray recently warned about this: https://www.npr.org/2024/01/31/1228153857/wray-chinese-hackers-national-security
The State of (Cyber)War is a project by members of the Cybersecurity Advisors Network (CyAN), with an interest in information security topics relevant to geopolitics, military cyberdefence, diplomacy, and other international topics. We discuss various aspects of both current and past issues from the point of view of interested amateurs with varying degrees of experience in the field, in a not-always-entirely-serious format.
Visit the Cybersecurity Advisors Network at https://cybersecurityadvisors.network
Intro music courtesy of AlexiAction via Pixabay: https://pixabay.com/users/alexiaction-26977400/
Outro music courtesy of Studio Kolomna via Pixabay: https://pixabay.com/users/studiokolomna-2073170/
Original YouTube video at https://youtu.be/HLVPDojARh0