Of Google, hackers and hairdressing schools

By John Sexton
0 CommentsPrint E-mail China.org.cn, February 23, 2010
Adjust font size:

US Cyber Strategy

In May 2009, the Pentagon created a new military command for cyberspace. The New York Times remarked that it revealed "preparations by the armed forces to conduct both offensive and defensive computer warfare."

In December 2009, as the attacks on Google were taking place, Obama appointed former Microsoft executive Howard Schmidt as Cyber-security Czar

A White House Cyberspace Policy Review published in June 2009 was peppered with references to public-private partnerships and will have made computer security firms salivate at the prospect of becoming fully-fledged members of the military-industrial complex.

In fact, another great source of bloodcurdling quotes on the Google affair has been computer security experts who have every interest in keeping the story alive.

The CEO of data encryption company PGP went so far as to compare Obama's cyber plans to President Eisenhower's order of the day on D-Day, calling it a "blueprint of what is required for us to achieve victory in this conflict," adding "as Ike [Eisenhower] said, we can accept nothing less than 'Victory!'"

Missile Gap

No-one should blame managers of security firms for taking the White House cyber strategy seriously. After all, there is serious money to be made. But journalists have a duty to be skeptical of government agents and those may profit from a story.

Fifty years ago, in his presidential campaign, John F Kennedy pointed to a "missile gap" between the Soviet Union and the US. President Eisenhower denied the Soviets had an advantage, but the Sputnik program had spooked the public and no-one believed him. By the time the missile gap was revealed as a myth it had played its political role.

2008 was not 1960. Obama's cyber strategy played a very small part in his campaign. But the Google hacking storm has come as a welcome diversion from domestic difficulties. The rest of us would all do well to remember that the balance of power in cyberspace remains heavily weighted in favor of America and that hysteria about Chinese hackers is overblown.

 

 

   Previous   1   2  


Print E-mail Bookmark and Share

Go to Forum >>0 Comments

No comments.

Add your comments...

  • User Name Required
  • Your Comment
  • Racist, abusive and off-topic comments may be removed by the moderator.
Send your storiesGet more from China.org.cnMobileRSSNewsletter
主站蜘蛛池模板: 欧美日韩一区二区三区自拍| 草草影院ccyy国产日本欧美| 天下第一社区视频在线观看www| 久久久久亚洲AV无码专区首JN| 欧美videos欧美同志| 亚洲精品无码av人在线观看| 精品一区二区三区水蜜桃| 国产99在线a视频| 香蕉视频在线观看男女| 国产极品视觉盛宴| 香焦视频在线观看黄| 在线观看的黄网| chinese乱子伦xxxx视频播放| 成人免费在线观看网站| 丰满爆乳一区二区三区| 日本老熟妇xxxxx| 九一在线完整视频免费观看 | a级特黄毛片免费观看| 巨r精灵催眠动漫无删减| 中文国产成人精品久久app| 揉美女胸的黄网站| 久久久久亚洲av无码去区首| 日韩不卡视频在线| 久久综合九九亚洲一区| 最近免费中文字幕大全高清大全1| 亚洲国产一区二区a毛片| 欧美韩国日本在线观看| 亚洲精品自在在线观看| 狠狠精品久久久无码中文字幕| 免费人成激情视频| 精品久久精品久久| 免费福利在线播放| 精品久久久久久中文| 六月婷婷综合网| 精品国产亚洲第一区二区三区| 又黄又爽又色的视频| 美国式禁忌矿桥| 午夜精品久久久内射近拍高清| 综合亚洲欧美日韩一区二区| 又黄又刺激视频| 精品午夜福利在线观看|