Chapter 409: Cyber Warfare

From the ancient Roman scholar Cicero, to the land power theorist Mackinder, the sea power theorist Mahan, and the air power theorist Duhei, they all insisted that whoever can control the sea can control the world; Whoever can dominate the heartland can dominate the worldly realm; Whoever controls outer space controls the Earth. The 21st century is the information age, the network has no borders, whoever controls the information and the network can control the world and win the future. Britain established the "empire on which the sun never sets" by conquering the continent; The United States climbed to the throne of a superpower by controlling the seas; Who will dominate the new century by controlling information and networks?

In the future, the Rubik's Cube of the world's politics will be controlled by those who have information power, and they will use the network control and information release power in their hands to achieve the goal that violence and money cannot conquer.

War is an eternal topic for mankind. At present and in the future, the factors that trigger war will always exist, and there are many types of war, the main ones being the scope of contention, territorial disputes, border disputes, plundering of strategic resources, competition for markets, ideological struggles, religious contradictions, ethnic contradictions, and so on. Imperialism and hegemonism are the root causes of modern warfare. The Internet is also full of conflicting ideas, contradictions, and even wars. The conflicts of interest and contention in the real world, the root causes and factors that lead to wars, have gradually begun to migrate and converge to the Internet, triggering wars on the Internet.

In the 21st century, the Internet has become a huge force to change the world, a strategic commanding heights of economic and social development, and a dominating change in the future world. The biggest change the Internet has brought about. It is to change the distribution of power. In the Internet age, with information technology as the core, information knowledge has become the most important factor in determining and even defining power. The inequalities resulting from the appropriation of information will be the same as those arising from the appropriation of violence and wealth. become the cause of the difference in power. Information and power are gradually intertwined and become the basis of the comprehensive national strength of each country. In the political, economic and military spheres. Compared with the traditional hard power, the soft power of informatization is becoming more and more important.

With the globalization of the Internet, the strategic importance of the Internet is becoming increasingly evident based on the traditional dimensions of political, economic and military power. The information and knowledge carried by the Internet are rapidly becoming a powerful source of power and wealth in a way that traditional power policies and internationalism cannot match. The wealth and knowledge carried by the Internet have become an important part of national interests, and network power has become an important part of the competition between countries.

Cyber power is merging with non-state actors, and interconnectedness is facilitating the re-construction of the world order. New forms of appropriation of production and resources have changed the contrast of forces in the social structure. leads to new forms of power. In the era dominated by industrial civilization, whoever owns mines, coal, oil, electricity, and transmission machinery will master the world. In the Internet age, a new strategic paradigm has begun to emerge, and whoever holds the control and distribution of the Internet will hold the dominant power.

State sovereignty is a sacred concept, which internally refers to the supreme right of the state to rule, the right of the state to choose the form of government of the state, and the right to exercise jurisdiction. Externally refers to the right of the state to independently decide its domestic and foreign policies. Now that there is a borderless Internet, the concept of borders linked to sovereignty is blurring, and traditional national sovereignty is being challenged.

Sovereign security is the first element of political security, and informatization and networking have changed the scope and space of national sovereignty. Information sovereignty has become an important part of the concept of national sovereignty, so the contention and struggle around information sovereignty is also an important area of national sovereignty struggle. In this battle for the future of global cyberspace, defend the country's information frontier. In the struggle to establish and safeguard information sovereignty, the sovereignty of many countries with weak Internet power is facing the threat of weakening. Judging from the quality of the exercise of information sovereignty in many countries. Developed countries are also far superior to developing countries.

With more and more advanced technological means, developed countries have acquired technological capabilities and control means that were not available in the era of the industrial revolution. Harm to the information sovereignty of developing countries. For example, through their monopoly on computer chips and key software technologies used by developing countries, developed countries actually control the nerve centers of these countries' political, economic, military, and other key sectors, and this dependence actually means a partial loss of national sovereignty.

In the information age, whoever has mastered important scientific and technological achievements will be able to greatly improve his economic level and economic strength, and will be in an advantageous position in the division of labor, trade, and finance in international economic relations, thereby enhancing his influence in the economic pattern of the world and ultimately enhancing his status and role in the international political pattern. Competition for comparative advantage in the Internet space is becoming an important part of the new international competition. The Internet will greatly change the future position of the international power and the center of global power.

The 'strategic warfare' of the industrial age is nuclear warfare, while the 'strategic warfare' of the information age is cyber warfare.

The Internet is inherently war-like. At present, network warfare has long gone beyond the level of "hacking such and such a website" and has developed into a war force and combat position that destroys other countries' key systems such as telecommunications, electric power, finance, and operational command through the Internet.

Whether it is military warfare or public opinion warfare, rapid and extensive network mobilization can be carried out. Any new invention or application related to the Internet has the potential to become a sharp weapon. Computer chips, operating systems, mobile phones, application software, etc. can be implanted with "spyware". It's no secret that Microsoft operating systems are planted with "spyware".

Cyber warfare may seem mysterious, but he is not.

Since the outbreak of the Somali war, the cyber war has not stopped, and the U.S. Cyber Command has been attacking various Somali networks on a daily basis. Unlike the usual online games between major countries, Somalia is an emerging country, and the Internet has just emerged, and it has not yet completely penetrated into all walks of life.

The cyber attacks from the United States have mainly focused on the Somali government and military networks and satellites, with the aim of paralyzing Somalia's information network capabilities.

Somalia's cyber defenses are as strong as real wars. However, although the effect is very unsatisfactory, the US military's cyber command has not given up and continues to carry out cyber attacks every day.

For the United States, the cyber war against Somalia is a completely new challenge, and the computer hardware and software used by the Somali side, as well as the data link, are very foreign to the United States, and there is no foreshadowing. There is no intersection with any software and hardware in the mainstream of the world.

From the very beginning of the cyber war, the US Cyber Command has deeply felt that this cyber war is more difficult than directly attacking the supercomputers of the central network of China and Russia. The defense and security of Somalia's cyber system is no less than that of any other country in the world, including the United States itself.

If Li Lan is in a weak position on the real battlefield, then on the network battlefield, with the presence of bases and assistants, he is already invincible. The most powerful supercomputer in the world is only one percent of the assistant's computing speed, and the world can't find a second supercomputer as intelligent as the assistant.

If we count it from the beginning, this cyber war was not initiated by Li Lan on his own initiative, since the establishment of the first official website during the Freedom Alliance period, the base has suffered no less than 20,000 cyber attacks every day. Especially during the war, there were more than a hundred thousand attacks per day.

From the defeat of the coalition navy, the frequency of such attacks has increased by another notch.

An hour before Mogadishu was razed, this kind of online offensive reached the peak of history, and even Li Lan was alarmed.

"Report, Commander, there are unknown individuals who are trying to hack into our military's space-based satellite navigation and command system."

At that time, Li Lan was taken aback by the report from the cyber troops. He is well aware that the space-based satellite navigation and command system faces not 10,000 but several thousand attacks every day. Hackers in the world are honored to have broken into the North China Dou Satellite Navigation System and the US GPS Global Positioning System. However, there are only a few that can really be attacked, and after each attack, the two systems will make up for those loopholes, making the security system of the whole system more and more perfect, which can be said to have advantages and disadvantages.

Now there is one more target for hackers in the world, and that is the base's space-based navigation and command system, which has been attacked more than 30,000 times a day under the leadership of the US Cyber Command.

Generally speaking, if it were not at the last moment, the network unit of the Red Police Corps would not alarm Li Lan, but would solve it internally. From this, it can be seen that the cyber forces are facing danger at the moment.

After receiving the report, Li Lan immediately stood up and walked towards the second basement floor of the base, and when he walked to the control department, he found that all the people were desperately operating, and all that could be heard in the entire room was the sound of the keyboard. Li Lan frowned slightly, and when Ouyang Annan saw Li Lan, he ran over and saluted, "Commander!" ”

"How's it going?" Li Lan immediately asked.

"The situation has basically stabilized, but fortunately we blocked it in time, and the opponent did not break through our worst defense, and is now looking for the position of the attacker!" Ouyang Annan said with a slight smile on his face. "The other party is very cunning, he has moved several continents, and we have not yet determined his location. But it can be judged that the other party is not a person, but a team, because in the process of tracking, someone used false signals to try to misguide us. (To be continued......)