Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone
  • Android

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Kindle-Preis: EUR 26,66
inkl. MwSt.

Diese Aktionen werden auf diesen Artikel angewendet:

Einige Angebote können miteinander kombiniert werden, andere nicht. Für mehr Details lesen Sie bitte die Nutzungsbedingungen der jeweiligen Promotion.

An Ihren Kindle oder ein anderes Gerät senden

An Ihren Kindle oder ein anderes Gerät senden

Facebook Twitter Pinterest
The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests von [Poindexter, Dennis F.]
Anzeige für Kindle-App

The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests Kindle Edition

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
EUR 26,66

Länge: 199 Seiten Word Wise: Aktiviert Verbesserter Schriftsatz: Aktiviert
PageFlip: Aktiviert Sprache: Englisch

Der lange Kindle-Lesesommer
Neu: Der lange Kindle-Lesesommer
Wir feiern die schönste Jahreszeit mit 30 Top-eBooks und einem Preisvorteil von mindestens 50%. Wir wünschen viel Freude mit Ihrer neuen Sommerlektüre. Jetzt entdecken



"The book raises important points and makes a strong case for more coordinated government and private sector efforts to address the information war problem effectively. Recommended" -- Choice "Choice"

"A strong addition to current events and international issues collections, recommended." -- Midwest Book Review "Midwest Book Review"

"Extensive factual research...provides ample references in this detailed eye opening expose that details the working of the Chinese government...fascinating." -- Slashdot "Slashdot"


This book is about a cyberwar with China. This new type of war, says the author, is China's effort at bending another country's will to its own. It is clever, broadly applied, successful, and aimed directly at the United States. This war is neither conventional nor accidental. The U.S. military is at a disadvantage because it is part of a system of government that is democratic, decentralized and mostly separated from American businesses. This system has served the country well but is not a path that China sees as worth following. This book is not a "how to" book of strategies that might be developed to fight a cyberwar. It is a way to grasp and categorize what the Chinese are already doing, to make sense of it. Until the U.S. sees itself as in a war, it cannot begin to effectively prosecute it.


  • Format: Kindle Edition
  • Dateigröße: 1743 KB
  • Seitenzahl der Print-Ausgabe: 199 Seiten
  • Verlag: McFarland (22. März 2013)
  • Verkauf durch: Amazon Media EU S.à r.l.
  • Sprache: Englisch
  • Text-to-Speech (Vorlesemodus): Aktiviert
  • X-Ray:
  • Word Wise: Aktiviert
  • Verbesserter Schriftsatz: Aktiviert
  • Durchschnittliche Kundenbewertung: Schreiben Sie die erste Bewertung
  • Amazon Bestseller-Rang: #826.516 Bezahlt in Kindle-Shop (Siehe Top 100 Bezahlt in Kindle-Shop)

  •  Ist der Verkauf dieses Produkts für Sie nicht akzeptabel?


Es gibt noch keine Kundenrezensionen auf
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Stern

Die hilfreichsten Kundenrezensionen auf (beta) HASH(0x968027d4) von 5 Sternen 10 Rezensionen
14 von 14 Kunden fanden die folgende Rezension hilfreich
HASH(0x96669630) von 5 Sternen This certainly builds the case 12. April 2013
Von Stephen Northcutt - Veröffentlicht auf
Format: Taschenbuch
This is a relatively short book, 181 pages, but it is meticulously researched. And what the author does, time and time again, is give the reader enough information that they can follow up using Google (or Baidu). He painstakingly builds his case to assert that we fight war differently today than what anyone with experience in such things is used to.

He goes on to explain using example after example how China uses the government, military and industry together to systematically achieve their goals to acquire technical information, make it indigenous, and work to improve it. He has a conversational writing style so even though you are exposed to a lot of information, you keep going to the next chapter.

I work in the field of information security and used to work in information warfare, so many of the examples are familiar to me, sort of a scary walk down memory lane, but more than once or twice, he had an example that I had to go research.

Before, I talk about the last chapter, I would like to address who can benefit from this book the most. It should be required reading for anyone with a business that has proprietary information. If you are in a business that is considering a joint venture in China, you should probably have to pass a test on the contents of the book. And since it is so approachable, I think almost anyone can benefit from the book.

Now, the final chapter. Obviously it would be wrong to steal the author's thunder in a review. It was, to be honest a bit disappointing. Like the rest of the book it is well written, well researched, and strongly supported by the rest of the book. By saying it was disappointing, I simply mean the details of how we have been unable to get our act together as a nation, especially the government side of things are disappointing. Again, I don't want to be a spoiler, but if you have been frustrated by the way Republicans and Democrats cannot seem to come together and develop reasonable fiscal policy; this is worse. However, we do need to know.

Final note, I think every reader will pretty much knew what the author was going to have to say as his conclusion, but he builds up to it and does it in an elegant way. Good show!
8 von 9 Kunden fanden die folgende Rezension hilfreich
HASH(0x9666cbe8) von 5 Sternen Fascinating overview on the cyberwar with China 17. Juni 2013
Von Ben Rothke - Veröffentlicht auf
Format: Taschenbuch
It's said that truth is stranger than fiction, as fiction has to make sense. Had The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests been written as a spy thriller, it would have been a fascinating novel of international intrigue.

But the book is far from a novel. It's a dense, but well-researched overview of China's cold-war like cyberwar tactics against the US to regain its past historical glory and world dominance.

Author Dennis Poindexter shows that Chinese espionage isn't made up of lone wolves. Rather it's under the directive and long-term planning of the Chinese government and military.

Many people growing up in the 1940's expressed the sentiment "we were poor, but didn't know it". Poindexter argues that we are in a cyberwar with China; but most people are oblivious to it.

Rather than being a polemic against China, Poindexter backs it up with extensive factual research. By the end of the book, the sheer number of guilty pleas by Chinese nationals alone should be a staggering wake-up call.

In February, Mandiant released their groundbreaking report APT1: Exposing One of China's Cyber Espionage Units, which focused on APT1, the most prolific Chinese cyber-espionage group that Mandiant tracked. APT1 has conducted a cyber-espionage campaign against a broad range of victims since at least 2006. The report has evidence linking them to China's 2nd Bureau of the People's Liberation Army.

China is using this cyberwar to their supreme advantage and as Poindexter writes on page 1: until we see ourselves in a war, we can't fight it effectively. Part of the challenge is that cyberwar does not fit the definition of what a war generally is because the Chinese have changed the nature of war to carry it out.
Poindexter makes his case in fewer than 200 pages and provides ample references in his detailed research; including many details, court cases and guilty verdicts of how the Chinese government and military work hand in hand to achieve their goals

The book should of interest to everyone given the implications of what China is doing. If you are planning to set up shop in China, be it R&D, manufacturing or the like, read this book. If you have intellectual property or confidential data in China, read this book as you need to know the risks before you lose control of your data there.

Huawei Technologies, a Chinese multinational telecommunications equipment and services firm; now the largest telecommunications equipment maker in the world is detailed in the book. Poindexter details a few cases involving Huawei and writes that if Huawei isn't linked to Chinese intelligence, then it's the most persecuted company in the history of international trade.

The book details in chapter 2 the intersection between cyberwar and economic war. He writes that any foreign business in China is required to share detailed design documents with the Chinese government in order to do business there. For many firms, the short-term economic incentives blind them to the long-term risks of losing control of their data. The book notes that in the Cold War with Russia, the US understood what Russia was trying to do. The US therefore cut back trade with Russia, particularly in areas where there might be some military benefit to them. But the US isn't doing that with China.

Chapter 2 closes with a damming indictment where Poindexter writes that the Chinese steal our technology, rack up sales back to us, counterfeit our goods, take our jobs and own a good deal of our debt. The problem he notes is that too many people focus solely on the economic relations between the US and China, and ignore the underpinnings of large-scale cyber-espionage.

Chapter 6 details that the Chinese have developed a long-term approach. They have deployed numerous sleepers who often wait decades and only then work slowly and stealthily. A point Poindexter makes many times is that the Chinese think big, but move slow.

Chapter 7 is appropriately titles The New Cold War. In order to win this war, Poindexter suggest some radical steps to stop it. He notes that the US needs to limit trade with China to items we can't get anywhere else. He says not to supply China with the rope that will be used to hang the US on.

He writes that the Federal Government has to deal with the issue seriously and quickly, to protect its telecommunications interests so that China isn't able to cut it all off one day. He also notes that national security must no longer take a backseat to price and cheap labor.

Poindexter writes that the US Government must take a long-view to the solution and he writes that it will take 10 years to build up the type of forces that that would be needed to counter the business and government spying that the Chinese are doing.

Rachel Carson's Silent Spring is the archetypal wake-up call book. Poindexter has written his version of Silent Spring, but it's unlikely that any action will be taken. As the book notes, the Chinese are so blatantly open about their goals via cyber-espionage, and their denials of it so arrogant, that business as usual simply carries on.

The Chinese portray themselves as benevolent benefactors, much like the Kanamits in To Serve Man. Just as the benevolence of the Kanamits was a façade, so too is what is going on with the cold cyberwar with China.

The book is an eye-opening expose that details the working of the Chinese government and notes that for most of history, China was the world's dominating force. The Chinese have made it their goal to regain that dominance.

The book states what the Chinese are trying to accomplish and lays out the cold facts. Will there be a response to this fascinating book? Will Washington take action? Will they limit Chinese access to strategic US data? Given Washington is operating in a mode of sequestration, the answer should be obvious.

The message detailed in The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests should be a wake-up call. But given that it is currently ranked #266,881 on Amazon, it seems as if most of America is sleeping through this threat.
1 von 1 Kunden fanden die folgende Rezension hilfreich
HASH(0x9666c1b0) von 5 Sternen China Is At War With The USA And Bent On Global Conquest! 17. Dezember 2013
Von Taurus454 - Veröffentlicht auf
Format: Taschenbuch
Dennis F. Poindexter has written a rather interesting book on China's involvement in the Information War. Of course, if you are expecting or want a detailed analysis of China's efforts then this is not the book for you. This book was written as a general guide or primer on the topic. Of course, I can appreciate the author's position that he is unable to go into greater detail of facts because of the nature of his work and that disclosing classified details would be a violation of the law. For that reason, the author has kept his discussion of the topic to the unclassified and public sources. With that said, if you want to be brought up to date on China's overall efforts by a fast and interesting read then I recommend this book. While the organization of the book leaves a little to be desired and the reason this book has four stars instead of five, the attentive reader can clearly learn the principals that govern Chinese behavior on the world stage and what their behavior actually consists of on the world stage. The one thing every reader will take away is the fact that China is at war with the USA and bent on global conquest through means other than conventional military conquest.
HASH(0x9666fdbc) von 5 Sternen Don't waste your time 28. Februar 2015
Von Brian D. Hughes - Veröffentlicht auf
Format: Kindle Edition Verifizierter Kauf
This stream of consciousness approach to writing is without any artistic or factual merit. As others note, the collection of words is in severe need of a good editor. Furthermore, the writer should check and document the few facts dispersed amongst the wildly spewed opinions. Two examples - on page 120 the writer refers to a prosecution "...under a new 1999 law". The law normally cited for trade secrets prosecution is the 1996 Economic Espionage Act. However the writer does not provide a reference to the "new 1999 law" so there is no way to tell if the writer is referring to the 1996 EEA or something else. The second example involves a sloppy mischaracterization. On page 125 the writer refers to an infrared missile. There is no such thing as an infrared missile. There are infrared seekers which are used to guide missiles to their targets. A little thought by the writer should have corrected these simple errors and perhaps produced something worth reading.
I forced myself to work through this collection of words with the hope something would emerge. Unfortunately, it is a complete waste of time.
A much better book on Chinese espionage is "Chinese Industrial Espionage: authors - Hannas, Mulvenon, Puglisi. Although the book does not focus on computer network exploitation, it is an authoritative explanation of the Chinese efforts to steal intellectual property.
HASH(0x9666ff54) von 5 Sternen I bought this based on a book review at slashdot ... 8. Oktober 2015
Von Mark Twain - Veröffentlicht auf
Format: Taschenbuch Verifizierter Kauf
I bought this based on a book review at slashdot. What a mistake. The other one star reviews are spot on - stream of consciousness writing and restating things often. No editing. I never finished this book. Stay away.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.
click to open popover