Generational Dynamics: Forecasting America's Destiny Generational
Dynamics
 Forecasting America's Destiny ... and the World's

 |  HOME  |  WEB LOG  |  COUNTRY WIKI  |  COMMENT  |  FORUM  |  DOWNLOADS  |  ABOUT  | 

Generational Dynamics Web Log for 23-Jan-2010
23-Jan-10 News - US vs China cyberwar, and Bernanke in trouble

Web Log - January, 2010

23-Jan-10 News - US vs China cyberwar, and Bernanke in trouble

News summary is New! Improved! with 'Additional Links.'

Google vs China is turning into US vs China

Detailed technical information about the announcement by Google last week that China had hacked its servers is coming out slowly but surely, but very slowly. The Dark Reading newsletter reports that the attack took advantage of a flaw in Internet Explorer that permits an attacker to install malware that takes control of the user's computer if the user visits an infected web site. Reverse engineering of the attack malware reveals that it contains code that can be traced back to Chinese programmers, although China's government claims that it had nothing to do with the attack.

The flaw in Internet Explorer is a serious one. Microsoft issued a "critical" patch to fix the flaw a couple of days ago. You should make sure that your version of the Internet Explorer is updated to include that patch. The Microsoft support site has further information.

However, the Google attack is metamorphosing from a tech story to a geopolitical story. The Obama administration has taken up Google's case, and demanded that China investigate the attack and provide some answers.

In a speech on Thursday, US Secretary of State Hilary Clinton said:

"In the last year, we’ve seen a spike in threats to the free flow of information. China, Tunisia, and Uzbekistan have stepped up their censorship of the internet. In Vietnam, access to popular social networking sites has suddenly disappeared. ...

States, terrorists, and those who would act as their proxies must know that the United States will protect our networks. Those who disrupt the free flow of information in our society or any other pose a threat to our economy, our government, and our civil society. Countries or individuals that engage in cyber attacks should face consequences and international condemnation. In an internet-connected world, an attack on one nation’s networks can be an attack on all. And by reinforcing that message, we can create norms of behavior among states and encourage respect for the global networked commons. ...

The most recent situation involving Google has attracted a great deal of interest. And we look to the Chinese authorities to conduct a thorough review of the cyber intrusions that led Google to make its announcement. And we also look for that investigation and its results to be transparent."

Clinton's remarks were pretty threatening, and the Chinese are apparently infuriated by these remarks.

Here's the response from China's Foreign Ministry:

"The US attacks China's internet policy, indicating that China has been restricting internet freedom. We resolutely oppose such remarks and practices that contravene facts and undermine China-US relations. ...

Hacking in whatever form and offence of others' privacy is prohibited by law in China. As a major victim of hacking in the world, China believes that the international community should intensify the cooperaion in jointly combating internet hacking so as to safeguard internet security and protect the privacy of citizens in accordance with law.

We urge the US to respect facts and stop attacking China under the excuse of the so-called freedom of internet. We hope that the US side can work with China to earnestly implement the consensus between leaders of both countries on developing bilateral relationship in the new era by strengthening dialogue, exchanges and cooperation, respecting each other's core interest and major concerns and properly handling differences and sensitive issues so as to ensure the healthy and stable development of China-US relationship."

The Foreign Ministry spokesman does make one very good point: Chinese web sites are as much victims of hacking as American web sites. As we described last week, there is a particularly vicious cyberwar between Iran and China.

Beyond that, the Chinese statement is about as weaselly as you can get. Note that:

From the point of view of Generational Dynamics, we're headed for a Clash of Civilizations world war with China and the US on opposite sides. It's becoming increasingly clear that a "cyber war" is going to be an important component of this real war.

Ben Bernanke's reconfirmation as Fed Chairman goes to the wire

The White House is still predicting that Ben Bernanke will be confirmed for a second term as Chairman of the Federal Reserve, according to the Baltimore Sun.

This is true even though four Senate Democrats have indicated that they will vote against confirmation. "It is time for a change," said California Democratic Senator Barbara Boxer.

However, a WSJ Blog says that the vote tally as of Friday evening is close:

    Voting “Yes”: 26 (18 Democrats, 8 Republicans)
    Voting “No”: 15 (4 Democrats, 10 Republicans, 1 Independent)
    Officially Undecided: 21 (13 Democrats, 7 Republicans, 1 Independent)
    The remainder of the senators haven’t officially commented.

60 "Yes" votes are required for confirmation.

Both supporters and opponents of confirmation are pointing to the aggressive actions that Bernanke took in implementing various monetary programs like quantitative easing, and advocating fiscal stimulus programs. Supporters say that he prevented a worse financial crisis, and opponents claim that he made things worse.

Actually, none of these politicians really has any idea whether Bernanke has made things better or worse. After this past Tuesday's election, these guys are just trying to decide which vote will make them more likely to get reelected next time.

I personally like Bernanke, even though I've been bitingly critical of his thinking. I think he's a decent honest guy. (See "The 'culture of complicity' continues with Tim Geithner's new toxic asset plan.")

If Bernanke's not confirmed for a second term at the Fed, then someone else will be chosen. And that someone else will be someone like Larry Summers or Hank Paulsen or Robert Rubin. These people are far less capable than Bernanke, and they're all sleazy, having made millions of dollars participating in the fraudulent creation and sale of toxic assets.

On the other hand, long time readers of this web site are well aware that we're headed for a major financial panic and crash. I believe that by this time Bernanke is aware of it as well. It's quite possible that Bernanke is HOPING that he won't be confirmed. That way, someone else will be blamed for what's coming.

Additional Links

The Times of India reports that India has gone on high alert based on intelligence that the Pakistan-based terror group Lashkar-e-Taiba (LeT) has acquired more than 50 para-gliders. These can be loaded with explosives and launched from unused airstrips to attack jetliners.

On Friday evening, the UK raised its terror threat level to "Severe," according to The Guardian. This means that the probability of a terror attack has gone from "substantial" to "highly likely."

European investors are beginning to talk about openly about a Greek default, according to Euro Intelligence, quoting FT Deutschland.

Another scandal involving global warming scientists: UN climate report riddled with errors on glaciers.

From web site reader Eric, a fascinating account by historian Sir John Glubb relating generations to empires. Glubb finds that an empire generally lasts for about ten generations.

News you can use: Too Much Sex Can Cause Wrist Pain.

(Comments: For reader comments, questions and discussion, see the 23-Jan-10 News - US vs China cyberwar, and Bernanke in trouble thread of the Generational Dynamics forum. Comments may be posted anonymously.) (23-Jan-2010) Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal

Web Log Pages

Current Web Log

Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004

Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004


Copyright © 2002-2016 by John J. Xenakis.