State-owned enterprises make up 80 percent: “Emerging-Market Multinationals: The Rise of State Capitalism,” Economist, January 21, 2012, http://www.economist.com/node/21543160.
$150 million loan for Ghana’s e-governance venture: Andrea Marshall, “China’s Mighty Telecom Footprint in Africa,” eLearning Africa News Portal, February 21, 2011, http://www.elearning-africa.com/eLA_Newsportal/china%E2%80%99s-mighty-telecom-footprint-in-africa/.
research hospital in Kenya: “East Africa: Kenya, China in Sh8 Billion University Hospital Deal,” AllAfrica, April 22, 2011, http://allafrica.com/stories/201104250544.html.
“African Technological City” in Khartoum: John G. Whitesides, “Better Diplomacy, Better Science,” China Economic Review, January 1, 1970, http://www.chinaeconomicreview.com/content/better-diplomacy-better-science.
There are currently four main manufacturers: Opinion of the authors.
Some refer to this as the upcoming Code War: Michael Riley and Ashlee Vance, “Cyber Weapons: The New Arms Race,” Bloomberg BusinessWeek, July 20, 2011, http://www.businessweek.com/magazine/cyber-weapons-the-new-arms-race-07212011.html. As you can see, we did not coin the term “code war.”
DDoS attacks crippled major government websites: Kim Zetter, “Lawmaker Wants ‘Show of Force’ Against North Korea for Website Attacks,” Wired, July 10, 2009, http://www.wired.com/threatlevel/2009/07/show-of-force/.
suggested that the network of attacking computers, or botnet, began in North Korea: Choe Sang-Hun and John Markoff, “Cyberattacks Jam Government and Commercial Web Sites in U.S. and South Korea,” New York Times, July 9, 2009, http://www.nytimes.com/2009/07/10/technology/10cyber.html?_r=1; Associated Press (AP), “U.S. Officials Eye N. Korea in Cyberattack,” USA Today, July 9, 2009, http://usatoday30.usatoday.com/news/washington/2009-07-08-hacking-washington-nkorea_N.htm.
Officials in Seoul directly pointed their fingers at Pyongyang: Choe and Markoff, “Cyberattacks Jam Government and Commercial Web Sites in U.S. and South Korea,” New York Times, July 9, 2009.
Republican lawmaker demanded: Zetter, “Lawmaker Wants ‘Show of Force’ Against North Korea for Website Attacks,” Wired, July 10, 2009.
analysts concluded they had no evidence that North Korea or any other state was involved: Lolita C. Baldor, Associated Press (AP), “US Largely Ruling Out North Korea in 2009 Cyber Attacks,” USA Today, July 6, 2010, http://usatoday30.usatoday.com/tech/news/computersecurity/2010-07-06-nkorea-cyber-attacks_N.htm.
analyst in Vietnam had earlier said that the attacks originated in the United Kingdom: Martyn Williams, “UK, Not North Korea, Source of DDOS Attacks, Researcher Says,” IDG News Service and Network World, July 14, 2009, http://www.networkworld.com/news/2009/071409-uk-not-north-korea-source.html?ap1=rcb.
South Koreans insisted: “N. Korean Ministry Behind July Cyber Attacks: Spy Chief,” Yonhap News, October 30, 2009, http://english.yonhapnews.co.kr/northkorea/2009/10/30/0401000000AEN20091030002200315.HTML.
semiconductors and motor vehicles to jet-propulsion technology: Michael Riley and Ashlee Vance, “Inside the Chinese Boom in Corporate Espionage,” Bloomberg BusinessWeek, March 15, 2012, http://www.businessweek.com/articles/2012-03-14/inside-the-chinese-boom-in-corporate-espionage.
England’s East India Company hired a Scottish botanist: “Famous Cases of Corporate Espionage,” Bloomberg BusinessWeek, September 20, 2011, http://images.businessweek.com/slideshows/20110919/famous-cases-of-corporate-espionage#slide3.
Chinese couple in Michigan: Ed White, Associated Press (AP), “Shanshan Du, Ex-GM Worker, Allegedly Tried to Sell Hybrid Car Secrets to Chinese Companies,” Huffington Post, July 23, 2010, http://www.huffingtonpost.com/2010/07/23/shanshan-du-ex-gm-worker_n_656894.html.
Chinese employee of Valspar Corporation: “Cyber Espionage: An Economic Issue,” China Caucus (blog), Congressional China Caucus, November 9, 2011, http://forbes.house.gov/chinacaucus/blog/?postid=268227; Foreign Spies Stealing U.S. Economic Secrets in Cyberspace, Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009–2011, Office of the National Counterintelligence Executive, (October 2011), 3, http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf.
DuPont chemical researcher: “Economic Espionage,” Office of the National Counterintelligence Executive, accessed October 22, 2012, http://www.ncix.gov/issues/economic/index.php.
“The basic premise is that when you have a network disease”: Craig Mundie in discussion with the authors, November 2011.
In Mundie’s vision: Ibid.
10 million lines of code: DARPA, “DARPA Increases Top Line Investment in Cyber Research by 50 Percent over next Five Years,” news release, November 7, 2011, http://www.darpa.mil/NewsEvents/Releases/2011/11/07.aspx; Spencer Ackerman, “Darpa Begs Hackers: Secure Our Networks, End ‘Season of Darkness,’ ” Danger Room (blog), Wired, November 7, 2011, http://www.wired.com/dangerroom/2011/11/darpa-hackers-cybersecurity/.
“We went after the technological shifts”: Regina Dugan, in discussion with the authors, July 2012.
They brought together cybersecurity experts: Cheryl Pellerin, American Forces Press Service, “DARPA Goal for Cybersecurity: Change the Game,” U.S. Air Force, December 20, 2010, http://www.af.mil/news/story.asp?id=123235799.
CHAPTER 4
THE FUTURE OF REVOLUTION
countries coming online have incredibly young populations: See low Internet penetration in 2011 for Ethiopia, Pakistan and the Philippines in “Percentage of Individuals Using the Internet,” International Telecommunication Union (ITU), ICT Data and Statistics (IDS), accessed October 16, 2012, http://www.itu.int/ITU-D/ict/statistics/, and young populations for those countries as of 2011 in “Mid-Year Population by Five Year Age Groups and Sex—Custom Region—Ethiopia, Pakistan, Philippines,” U.S. Census Bureau, International Data Base, accessed October 16, 2012, http://www.census.gov/population/international/data/idb/region.php.
women were able to play a much greater role: Courtney C. Radsch, “Unveiling the Revolutionaries: Cyberactivism and the Role of Women in the Arab Uprisings,” James A. Baker III Institute for Public Policy, Rice University, May 17, 2012; Jeff Falk, “Social Media, Internet Allowed Young Arab Women to Play a Central Role in Arab Spring,” May 24, 2012, Rice University, News and Media, http://news.rice.edu/2012/05/24/social-media-and-the-internet-allowed-young-arab-women-to-play-a-central-role-in-the-arab-spring-uprisings-new-rice-study-says-2/; Women and the Arab Spring: Taking Their Place?, International Federation for Human Rights, accessed November 4, 2012, http://www.europarl.europa.eu/document/activities/cont/201206/20120608ATT46510/20120608ATT46510EN.pdf; Lauren Bohn, “Women and the Arab Uprisings: 8 ‘Agents of Change’ to Follow,” CNN, February 3, 2012, http://www.cnn.com/2012/02/03/world/africa/women-arab-uprisings/index.html.