What is Big Think?  

We are Big Idea Hunters…

We live in a time of information abundance, which far too many of us see as information overload. With the sum total of human knowledge, past and present, at our fingertips, we’re faced with a crisis of attention: which ideas should we engage with, and why? Big Think is an evolving roadmap to the best thinking on the planet — the ideas that can help you think flexibly and act decisively in a multivariate world.

A word about Big Ideas and Themes — The architecture of Big Think

Big ideas are lenses for envisioning the future. Every article and video on bigthink.com and on our learning platforms is based on an emerging “big idea” that is significant, widely relevant, and actionable. We’re sifting the noise for the questions and insights that have the power to change all of our lives, for decades to come. For example, reverse-engineering is a big idea in that the concept is increasingly useful across multiple disciplines, from education to nanotechnology.

Themes are the seven broad umbrellas under which we organize the hundreds of big ideas that populate Big Think. They include New World Order, Earth and Beyond, 21st Century Living, Going Mental, Extreme Biology, Power and Influence, and Inventing the Future.

Big Think Features:

12,000+ Expert Videos


Browse videos featuring experts across a wide range of disciplines, from personal health to business leadership to neuroscience.

Watch videos

World Renowned Bloggers


Big Think’s contributors offer expert analysis of the big ideas behind the news.

Go to blogs

Big Think Edge


Big Think’s Edge learning platform for career mentorship and professional development provides engaging and actionable courses delivered by the people who are shaping our future.

Find out more

Cyber War Games: U.S. V. China

June 27, 2011, 12:00 AM

What's the Big Idea?

In a revealing book about Chinese espionage called Tiger Trap: America's Secret Spy War With China, intelligence expert David Wise details the long history of Chinese espionage going back to the Cold War. It is a different sort of spying that Americans are used to seeing.

“If a beach was an espionage target," Wise notes, "the Russians would send in a sub, frogmen would steal ashore in the dark of night and with great secrecy collect several buckets of sand and take them back to Moscow."

On the other hand, the US "would target the beach with satellites and produce reams of data."

The Chinese, however, would send in a thousand tourists, each assigned to collect a single grain of sand. When they returned, they would be asked to shake out their towels. And they would end up knowing more about the sand than anyone else.”

In other words, China has been co-opting the thousands of students, tourists, business travelers and scientists who visit the US each year. Wise argues they are probably also at least giving tacit permission to hackers to attack the computers of companies and governments in the US, Taiwan, India, and other nations. Like the U.S., China has devised war games to disrupt the digital networks of an adversary in a war. While the Chinese government has steadfastly denied this, the available evidence points to the contrary. For instance, a Wikileaks cable revealed that the Chinese Government coordinated intrusions in Google’s systems in 2010.

The U.S. government has not made much a fuss about all of this, according to Wise, because China effectively is the bank that holds the mortgage to our "house."

What's the Significance?

Cyber warfare involves more than just reading people's emails. Wise sites security experts who worry about the compromise of not only software but hardware such as missiles, aircraft, and radar systems:

"One reason is that only about 2 percent of the integrated circuits purchased every year by the military are manufactured in the United States. And even most American chip makers have moved offshore, where labor is cheaper. A computer chip made with a hidden, malicious flaw could sabotage a weapons system. And the compromised hardware is almost impossible to detect."

In fact, Wise writes that a chip might be embedded with a so-called "kill switch" that would allow a weapon to be disabled by remote control. This may seem far-fetched, but there are unconfirmed reports that Israeli intelligence may have used such a "kill switch" to shut down Syrian air defenses during an attack in 2007.

Wise convincingly demonstrates how "a few key strokes on the computer" can function as a weapon of mass destruction. CIA director James Woolsey tells him: "Taking down the grid for months comes as close to a nuclear attack with many weapons on the United States as anything could. You'd have mass starvation and death from thirst and all the rest."

In his interview with Big Think, Wise describes the digital war games that are being played out by the U.S. and China, and where the U.S. might be the most vulnerable to attack. Watch here:


Cyber War Games: U.S. V. China

Newsletter: Share: