Generational Dynamics: Forecasting America's Destiny Generational
Dynamics
 Forecasting America's Destiny ... and the World's

 |  HOME  |  WEB LOG  |  COUNTRY WIKI  |  COMMENT  |  FORUM  |  DOWNLOADS  |  ABOUT  | 

Generational Dynamics Web Log for 13-Mar-2013
13-Mar-13 World View -- American businesses debate cyber counter-attack on China

Web Log - March, 2013

13-Mar-13 World View -- American businesses debate cyber counter-attack on China

Venezuela to investigate America's 'cancer poisoning' of Chavez

This morning's key headlines from GenerationalDynamics.com

Britain may supply weapons to anti-government rebels in Syria


David Cameron
David Cameron

Britain's prime minister David Cameron said on Tuesday that he might break with the rest of the European Union and supply weapons to anti-regime rebels in Syria. This is coming in response to continuing atrocities by the regime of Syria's president Bashar al-Assad, targeting innocent women and children in their homes, beds and schools, using weapons supplied by the Russians and the Iranians. All 27 member states of the European Union have agreed to an arms embargo with respect to Syria, but Britain recently pushed for an won an agreement to amend the embargo to supply non-lethal equipment such as body armor and armored vehicles. But now Cameron wants to go farther, and hopes that Britain and the other EU members will agree. "But if we can't, then it's not out of the question we might have to do things in our own way. It's possible." The Germans oppose such a move, for fear that it would spread conflict in the region. Reuters

American businesses debate cyber counter-attack on China

For years, everybody "knew" that it was Chinese hackers that were hacking into the networks of thousands of American companies and stealing information. But the Chinese just kept denying culpability, and no one could say for sure that the Chinese government was involved. That changed with the report published last month by Mandiant. (See "20-Feb-13 World View -- New report reveals massive cyber war attack by China's army") That report provides forensic proof that China's People's Liberation Army (PLA) has been systematically conducting cyberwar against American government and corporate organizations. In particular, the PLA's "Unit 61398," working out of a building in Shanghai, gains control of a company's network, retains control in stealth mode, and downloads all the data in the network over a period of months, sometimes terabytes of data.

The nation of Georgia decided to counter-attack when it discovered that the networks of its ministries, parliament and banks had been compromised, and had downloaded many files. They tricked the hackers into downloading a poisoned file that installed malware on the hackers' computers. The Georgia researchers then were able to download data from ther hackers' computers, and prove that that the attack came from Russian security agencies.

A lot of U.S. companies would like to get similar revenge against Chinese hackers. They're tired of having to spend billions of dollars trying to protect their networks, and still the Chinese hackers get away scot free, available to hack into other companies' networks and steal data. And there's a new phrase coming into vogue -- "hacking back" -- which means hacking into an attacker's network either to steal data or to do actual damage.

However, there are two problems with a hackback strategy:

The Mandiant report has hardened attitudes on this issue. The Chinese will continue to express indignant outrage, as they do whenever they're questioned about their rapidly increasing military belligerence anywhere, but they'll also continue and even escalate cyberattacks on Western governments and companies. NPR and Georgia Government Data Exchange Agency (PDF) and Steptoe Cyberblog

Administration says cyber defense impacted by sequestration

Cyberwar has entered the sequestration debate arena.

Attempts to protect America against cyberattacks is being compromised by sequestration, according to Senate testimony on Tuesday by National Intelligence Director James Clapper.

"Our cyber efforts will be impacted. This is an area where, you all know, we need to keep ahead of rapid technology advances to maintain and increase access to adversaries, as well as provide warning of a cyber attack against the U.S."

However, others say that President Barack Obama in August 2011 rejected a series of tough actions against China, including counter-cyber attacks and economic sanctions, for Beijing’s aggressive campaign of cyber espionage against the U.S. government and private businesses networks.

In other news, the pigs running Washington have almost reached a point of total chaos and incoherence. I just hope we survive. VOA and Free Beacon

Venezuela to investigate America's 'cancer poisoning' of Chávez

Venezuela's acting president Nicolás Maduro announced on Tuesday that foreign scientists will be invited to join a government commission to investigate with America "poisoned" Hugo Chávez, causing him to develop cancer and die from it.

"We will seek the truth. We have the intuition that our commander Chávez was poisoned by dark forces that wanted him out of the way."

The accusation has been derided by critics of the government, who say that it's a typical Chávez-style conspiracy theory intended to feed fears of "imperialist" threats. Al-Jazeera

(Comments: For reader comments, questions and discussion, see the 13-Mar-13 World View -- American businesses debate cyber counter-attack on China thread of the Generational Dynamics forum. Comments may be posted anonymously.) (13-Mar-2013) Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal

Web Log Pages

Current Web Log

Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004

Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004


Copyright © 2002-2016 by John J. Xenakis.