The attack on the law firms and attacks like that are industrial espionage, searching for copyrighted materials to lift and so on; it's not quite the same as cyber-warfare. They are regarded as related. The Chinese are trying to steal an economic march on the West, which is a consequence of the fact that we outsourced all of our manufacturing to China in the 1990s.
Misha GlennyThe U.S. has the most advanced cyber-weaponry on the planet, and t if you look at the U.S. from the perspective of the Chinese People's Liberation Army, which runs most of its cyber activities, they look at you and they see Google and Facebook - the two largest depositories of personal data in the world - and they see the reach of the National Security Agency, which has huge digital capacity to know what is going on around the world. So the Chinese would see cyber as an un-level playing field, because the U.S. holds all sorts of advantages.
Misha GlennyThe Internet has fashioned a new and complicated environment for an age-old dilemma that pits the demands of security against the desire for freedom.
Misha GlennyWhen you're researching things that have happened, the clear narrative arc is not there already. This is the problem of writing nonfiction for me - writing nonfiction which is about serious subjects and has serious political and social points to make, yet which is meant to be popular to a degree - what happens when the facts don't fit a convenient narrative arc? I guess that for a lot of nonfiction writers that is a central challenge.
Misha GlennyThe criminal justice system - although this applies less to the U.S., where rehabilitation is not seen as a valuable contribution to criminal justice - in Europe where rehab is supposed to be integral, we have no way of rehabilitating skilled hackers. On the contrary what we do is we demonize them and continue to do so after they come out of jail because we restrict their access to computers by law. Crazy world, crazy people.
Misha GlennyThe anonymity issue is a big question. As long as people can disguise cyber attacks and as long as there is a sort of question mark over who is responsible, then the problem will continue to exist. And of course what happens in response to that is that there is a move to try and refashion the Internet so that anonymity is impossible, which of course leads to fears among all sorts of groups - civil rights groups, NGOs, and political parties - that the Internet is going to be used simply as a method of control. So these are very sensitive issues.
Misha Glenny